cpu-class-settings-modify
NetVisor OS’s CPU Control Packet Processing Protection feature allows the CPU control packet processing path be protected against misbehaving, and malicious hosts or end-points that may flood control protocol packets. This is also called “CPU hog protection”.
If a host floods a control protocol packet, it floods the to-cpu queue. This prevents lower-rate packets from valid senders from reaching NetVisor, resulting in traffic loss for those hosts. Typically a traffic loss occurs for other hosts on the network. NetVisor OS can process large streams of both valid, and malformed protocol packets for various protocols.
Syntax cpu-class-settings-modify
hog-checker-interval hog-checker-interval-number (ms) |
Specify the hog checking interval in milliseconds. |
hog-max-hosts-per-class hog-max-hosts-per-class-number |
Specify the maximum number of active hosts tracked per CPU class. |
hog-max-violators-per-port hog-max-violators-per-port-number |
Specify the maximum number of hog violators per port. |
hog-max-violators-per-port hog-max-violators-per-port-number |
Specify the hog warning threshold. |
hog-violator-timeout hog-violator-timeout-number (s) |
Specify the timeout before restoring the hog violator to normal queue after an idle state. |
Defaults None
Access Network Administrator
History
Version 2.6.0 |
Command introduced. |
Usage Use this command to modify statistics settings for CPU class.
Examples To modify CPU class settings for hog-checker-interval from 100 to 150, use the following syntax:
CLI (network-admin@switch) > cpu-clss-settings-modify hog-checker-interval 150